Cybersecurity loopholes prevalent in South East Asia
In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.
Dramatic uptick in threat activity with exploits growing nearly 150%
"While it’s not a surprise given increased attack opportunities like remote work, it’s still a worrying development and one we cannot ignore."
2021 the year cyber criminals got creative - Proofpoint
One constant that remains as organisations approach a sense of normalcy after a disruptive year is that cyber criminals continue to target and exploit people.
New vulnerabilities found in Nuspire’s Q1 2022 Threat Report
“Threat actors are quickly adjusting their tactics and these exploits tend to get industry attention, but the threat posed by older and attacks still persists."
Infoblox's State of Security Report spotlights Australian remote work hazards
Attackers exploit weak WiFi, remote endpoints, and the cloud, costing 50% of organisations over $1.3 million in breach damages.
Use of malware, botnets and exploits expands in Q1 2022
"As zero-day attacks and other vulnerabilities among companies like Google and Microsoft come to light, threat actors are quickly adjusting their tactics."
WordPress vulnerabilities more than doubled in 2021
WordPress vulnerabilities more than doubled in 2021, and 77% of them are exploitable.
Log4j actively exploited, serious complications can occur according to CERT NZ
The widely-used java logging library, log4j, has been actively exploited, according to an update from CERT NZ and Catalyst.
Companies exploited by high-risk vulnerabilities, new research shows
"Our automated security assessment proved that all companies have network services available for connection on their network perimeter, allowing hackers to exploit software vulnerabilities and bruteforce credentials to these services."
Radiflow launches iRISK for greater visibility into risk and vulnerability
Radiflow, the company that provides cybersecurity solutions for industrial automation networks, has launched a business driven industrial risk analytics service known as iRISK.
US$250,000 up for grabs with Microsoft’s bug bounty
Microsoft has announced the Speculative Execution Side Channel Bounty Program that is offering up to USD$250,000 to people who reveal novel bugs.
Cisco ASA appliances at risk of denial of service exploit
The Australian Cyber Security Centre (ACSC) has issued an official alert to those who use Cisco’s Adaptive Security Appliance (ASA).
North Korean threat group suspected to be behind Adobe Flash exploit
An exploit that targeted an Adobe Flash vulnerability looks to be the work of a North Korean group called TEMP.Reaper.
Fool me once... ransomware strikes firms twice on average, survey finds
“Ransomware is not a lightning strike – it can happen again and again to the same organisation."
Cybersecurity firm Votiro joins VMware's TAP program
Israeli-based cybersecurity firm Votiro has joined VMware’s Technology Alliance Partner Program as an access level partner.
ShadowPad exploit ‘one of the biggest’ APAC supply chain attacks
Several recent versions of NetSarang Server Management software were compromised by the ‘ShadowPad’ exploit.
WatchGuard report: 30% of all malware isn’t caught by legacy AV
WatchGuard’s Quarterly Internet Security Report says that 30% of malware attacks are new or zero day exploits - and legacy AVs are missing threats.
March saw rise in web attacks; but email malware and spam drop back
Symantec reports back on the latest threat statistics for March - email malware dipped, but web attacks are the biggest since 2016.
Google’s hacking contest ‘Project Zero’ was a flop: What went wrong?
Not a single person claimed Google’s Project Zero prizes, even after six months of being open to participants.
APAC is now a 'honeypot' for cyber attacks as most targeted region in the world
Trend Micro’s latest report says that Asia Pacific region was something of a giant honeypot for cyber attacks last year, beating all other regions.
With ever-shifting sands, knowledge is the ultimate power in cyber security
Hackers are conducting "reconnaissance" to find prosperous neighbourhoods to attack, then they "scan" the individual system to test for easiest entry.
Siemens-branded CCTV webcams require urgent firmware patch
Siemens-branded IP-based CCTV cameras are the latest internet-connected devices to be found vulnerable to hacking attacks.